Archive | Network Hacking




miranda-upnp – Interactive UPnP Client

Miranda is a Python-based UPnP (Universal Plug-N-Play) client application designed to discover, query and interact with UPNP devices, particularly Internet Gateway Devices (aka, routers). It can be used to audit UPNP-enabled devices on a network for possible vulnerabilities. Miranda was built on and for a Linux system and has been tested on a Linux 2.6 […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

fping 3 – Multi Target ICMP Ping Tool

fping is a program like ping which uses the Internet Control Message Protocol (ICMP) echo request to determine if a target host is responding. fping differs from ping in that you can specify any number of targets on the command line, or specify a file containing the lists of targets to ping. Instead of sending […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

WOL-E – Wake On LAN Security Testing Suite

WOL-E is a suite of tools for Wake on LAN security testing related to the WOL features of network attached computers, this is now enabled by default on many Apple computers. This allows you to easily scan for Apple devices on a network (based on their MAC addresses). Features These tools include: Bruteforcing the MAC […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

dnmap – Distributed Nmap Framework

dnmap is a distributed Nmap framework which can hand off Nmap scans to several clients. It reads an already created file with Nmap commands and send those commands to each client connected to it. The framework use a client/server architecture. The server knows what to do and the clients do it. All the logic and […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

DMitry – Deepmagic Information Gathering Tool

DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU) Linux Command Line program coded purely in C with the ability to gather as much information as possible about a host. DMitry has a base functionality with the ability to add new functions, the basic functionality of DMitry allows for information to be gathered about a target […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Web Hacking | Add a Comment

Automater – IP & URL OSINT Tool For Analysis

Automater is a URL/Domain, IP Address, and Md5 Hash OSINT tool aimed at making the analysis process easier for intrusion Analysts. Given a target (URL, IP, or HASH) or a file full of targets Automater will return relevant results from sources like the following: IPvoid.com, Robtex.com, Fortiguard.com, unshorten.me, Urlvoid.com, Labs.alienvault.com, ThreatExpert, VxVault, and VirusTotal. By […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Criminal Rings Hijacking Unused IPv4 Address Spaces

So apparently this Hijacking Unused IPv addresses has been going on for a while, but with quite a lot number of attempts recently it’s ramped up a LOT since the September announcement by ARIN about IPv4 depletion. There was only only 50 hijacking attempts between 2005 and 2015. Since September, ARIN has already seen 25 […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Network Hacking | Add a Comment

CapTipper – Explore Malicious HTTP Traffic

CapTipper is a Python tool to explore malicious HTTP traffic, it can also help analyse and revive captured sessions from PCAP files. It sets up a web server that acts exactly as the server in the PCAP file and contains internal tools with a powerful interactive console for analysis and inspection of the hosts, objects […]

Tags: , , , , , , , , , ,

Posted in: Forensics, Network Hacking | Add a Comment

SubBrute – Subdomain Brute-forcing Tool

SubBrute is a community driven project with the goal of creating the fastest, and most accurate subdomain brute-forcing tool. Some of the magic behind SubBrute is that it uses open resolvers as a kind of proxy to circumvent DNS rate-limiting. This design also provides a layer of anonymity, as SubBrute does not send traffic directly […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

WAFW00F – Fingerprint & Identify Web Application Firewall (WAF) Products

WAFW00F is a Python tool to help you fingerprint and identify Web Application Firewall (WAF) products. It is an active reconnaissance tool as it actually connects to the web server, but it starts out with a normal HTTP response and escalates as necessary. You can override or include your own headers, it has SOCKS and […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·